Try our new research platform with insights from 80,000+ expert users

CyberArk Endpoint Privilege Manager vs One Identity Safeguard comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.2
CyberArk Endpoint Privilege Manager enhances security, reduces risks and costs, saves resources, and protects sensitive information effectively.
Sentiment score
6.9
Organizations achieved ROI with One Identity Safeguard through enhanced security, cost savings, efficiency, and better protection against threats.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
Lead Consultant at a tech vendor with 501-1,000 employees
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
Commercial and Technical Professional Manager at Evolution Technologies Group
The time is reduced by nearly fifty percent for our audit preparation and compliance reporting compared to earlier.
Manager, Account Services Delivery at Softcell Technologies Limited
I have seen a return on investment through reduced audit effort and fewer security incidents related to privileged access, along with significant time savings for IT and security teams by automating access control and password management.
office administrator at Gitarattan International Business School
The efficiency of our team has increased as we have reduced manual credential management, allowing our IT team to focus on higher value tasks.
Technical Head Cloud Services at Softcell Technologies Limited
 

Customer Service

Sentiment score
6.2
CyberArk Endpoint Privilege Manager support is knowledgeable but needs improvements in response times, accessibility, and first-level assistance.
Sentiment score
6.9
One Identity Safeguard's customer service is praised for technical strength but needs improvement in response times for complex issues.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
Security Delivery Analyst at Accenture
We engage them when needed and receive prompt responses that typically resolve our issues.
Global Security Systems Consultant at a insurance company with 10,001+ employees
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
Lead Consultant at a tech vendor with 501-1,000 employees
I sometimes need escalations to reach expertise.
Consultant at a tech vendor with 11-50 employees
Sometimes, I get a very helpful response and they address issues on a call.
Systems Administrator at a university with 10,001+ employees
When I have day-to-day incidents and problems, the response is good enough in terms of time and quality.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
 

Scalability Issues

Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for large deployments, praised for growth-centered architecture despite integration complexities.
Sentiment score
7.3
One Identity Safeguard efficiently scales for medium to enterprise levels but may require adjustments for optimal performance.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
Global Security Systems Consultant at a insurance company with 10,001+ employees
CyberArk Endpoint Privilege Manager is quite scalable.
Security Delivery Analyst at Accenture
The available reports and other security tools assist in scaling it according to my organization's needs.
Cybersecurity Manager at a consultancy with 10,001+ employees
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
Safeguard handles a growing number of users, systems, and sessions without significant degradation in performance.
Automation tester at a consultancy with 51-200 employees
We have a cluster of SPPs and a cluster of SPSs, and we can add a node to that cluster without much fuss.
Systems Administrator at a university with 10,001+ employees
 

Stability Issues

Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable, with 99.99% uptime, reliable on Windows, needing console improvements and minimal memory.
Sentiment score
7.8
One Identity Safeguard is praised for its stability, reliability, and minimal downtime, with minor challenges resolved through support.
It is a robust solution that has effectively supported our environment without major issues.
Security Delivery Analyst at Accenture
Since implementing it, we have not experienced any outages or stability issues.
Global Security Systems Consultant at a insurance company with 10,001+ employees
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
Lead Consultant at a tech vendor with 501-1,000 employees
The session proxying, password vaulting, and automated workflow run consistently even under high load.
Automation tester at a consultancy with 51-200 employees
I would rate it a nine out of ten for stability.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
In terms of stability, I rate One Identity Safeguard nine to ten out of ten.
Business Line Manager - IGA & PAM at a tech services company with 201-500 employees
 

Room For Improvement

CyberArk Endpoint Privilege Manager needs improved integration, user interface, and pricing, along with enhanced compatibility and functionality.
One Identity Safeguard requires better integration, user experience, performance, intuitive configuration, and improved documentation for broader adoption.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Global Security Systems Consultant at a insurance company with 10,001+ employees
Currently, no user-based policy option is available inside the EPM console.
Lead Consultant at a tech vendor with 501-1,000 employees
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
Solution Architect at a consultancy with 10,001+ employees
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
Consultant at a tech vendor with 11-50 employees
There are many steps. We are still in the onboarding phase, and it seems very manual.
Systems Administrator at a university with 10,001+ employees
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
 

Setup Cost

CyberArk Endpoint Privilege Manager's high pricing is justified by its quality, features, and appeal to large enterprises in finance.
Enterprise users find One Identity Safeguard costly but valuable for its robust security and flexibility despite extra costs.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
Cybersecurity Manager at a consultancy with 10,001+ employees
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
Lead Consultant at a tech vendor with 501-1,000 employees
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
Manager at a computer software company with 1,001-5,000 employees
It is one of those where the more you buy, the cheaper it is.
Systems Administrator at a university with 10,001+ employees
It is cheaper than CyberArk.
Team Lead / Consultant at a computer software company with 5,001-10,000 employees
It is more expensive than Secret Server but way less expensive than CyberArk.
IAM Specialist
 

Valuable Features

CyberArk Endpoint Privilege Manager enhances security by managing privileges, integrating seamlessly, and preventing ransomware while ensuring regulatory compliance.
One Identity Safeguard enhances security with advanced authentication, auditing, session management, and integrations, simplifying organizational access and compliance.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
Security Delivery Analyst at Accenture
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
Head of Sales Services Department at a comms service provider with 51-200 employees
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
Cybersecurity Manager at a consultancy with 10,001+ employees
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
Systems Administrator at a university with 10,001+ employees
Automatic credential rotation helps our team by removing the need for manual changes to privileged passwords, reducing the risk of stale or shared credentials and ensuring that every access is controlled and compliant.
Technical Consultant at ProTechmanize Solutions (P) Ltd.
Just-in-time access has sped up admin task completion and improved our overall compliance reporting, allowing audits to be completed nearly half the time compared to earlier.
Manager, Account Services Delivery at Softcell Technologies Limited
 

Categories and Ranking

CyberArk Endpoint Privilege...
Ranking in Privileged Access Management (PAM)
4th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Anti-Malware Tools (5th), Application Control (3rd), Ransomware Protection (5th)
One Identity Safeguard
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
52
Ranking in other categories
User Entity Behavior Analytics (UEBA) (6th), Non-Human Identity Management (NHIM) (3rd)
 

Mindshare comparison

As of February 2026, in the Privileged Access Management (PAM) category, the mindshare of CyberArk Endpoint Privilege Manager is 2.5%, down from 3.6% compared to the previous year. The mindshare of One Identity Safeguard is 3.9%, down from 4.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
One Identity Safeguard3.9%
CyberArk Endpoint Privilege Manager2.5%
Other93.6%
Privileged Access Management (PAM)
 

Featured Reviews

Sumit Chavan - PeerSpot reviewer
Lead Consultant at a tech vendor with 501-1,000 employees
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
SV
Automation tester at a consultancy with 51-200 employees
Centralized controls have improved privileged access and simplified compliant audit workflows
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half years. The best feature I appreciate is the session proxying and recording. It provides transparent session access for admins without exposing the real passwords. Another valuable feature is automated password rotation, which changes the credentials automatically after each use or on a schedule. It reduces the risk of leakage and reuse of passwords. Additionally, the approval workflow and the access request feature add governance with multi-level approvals for sensitive systems. These are the features that I appreciate the most. When we started using the session proxying and recording features, overall, it was a manageable and fairly smooth process for us. However, like most security platform deployments, it had a few learning curves. Session proxying and recording worked with our major systems including Windows, Linux, and network devices with minimal configuration. Some devices and services required slight changes to firewall rules and configuration to ensure the proxy could connect cleanly. Additionally, our admins needed orientation so they understood they were joining a recorded session, particularly for remote or support use. We spent considerable time adjusting the session filtering, retention settings, and naming conventions so recordings were useful and not overwhelming. These are some areas where we encountered challenges.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
10%
Government
8%
Computer Software Company
10%
University
8%
Comms Service Provider
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise17
Large Enterprise19
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
What is your experience regarding pricing and costs for One Identity Safeguard?
My experience with pricing, setup cost, and licensing has been a good experience overall, as the back and forth with One Identity is something that is acceptable; other tools have options to do thi...
What needs improvement with One Identity Safeguard?
One Identity Safeguard could be improved with a password manager and an identity manager as one big access management system. I believe improvements could be made around integrating with other tools.
What is your primary use case for One Identity Safeguard?
My main use case for One Identity Safeguard is using only one module for privileged session, which we use for admins and contractors. A quick specific example of how my team uses One Identity Safeg...
 

Also Known As

Viewfinity
No data available
 

Overview

 

Sample Customers

Information Not Available
Cavium
Find out what your peers are saying about CyberArk Endpoint Privilege Manager vs. One Identity Safeguard and other solutions. Updated: February 2026.
881,757 professionals have used our research since 2012.